{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:05:31Z","timestamp":1764842731705,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NYUAD&#x0027;s Research Enhancement Fund"},{"name":"eDLAuto: An Automated Framework for Energy-Efficient Embedded Deep Learning in Autonomous Systems"},{"name":"NYUAD Center for CyberSecurity"},{"DOI":"10.13039\/100020770","name":"Research Institute Centers, New York University Abu Dhabi","doi-asserted-by":"publisher","award":["G1104"],"award-info":[{"award-number":["G1104"]}],"id":[{"id":"10.13039\/100020770","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1109\/tetc.2023.3279419","type":"journal-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T17:24:42Z","timestamp":1685467482000},"page":"851-867","source":"Crossref","is-referenced-by-count":9,"title":["An Energy-Efficient Generic Accuracy Configurable Multiplier Based on Block-Level Voltage Overscaling"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0489-555X","authenticated-orcid":false,"given":"Ali Akbar","family":"Bahoo","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Eyvanekey, Semnan, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4022-663X","authenticated-orcid":false,"given":"Omid","family":"Akbari","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-8135","authenticated-orcid":false,"given":"Muhammad","family":"Shafique","sequence":"additional","affiliation":[{"name":"Division of Engineering, New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2535398"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71713-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7926993"},{"year":"2021","key":"ref34","article-title":"SIPI image database"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2014.2333366"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317781"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2839266"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317835"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2012.2183574"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2009.2027626"},{"journal-title":"The pocket handbook of image processing algorithms","year":"2009","author":"myler","key":"ref33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2975695"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2015.02.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2643003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2011.51"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297389"},{"journal-title":"Computer Arithmetic Algorithms","year":"2002","author":"koren","key":"ref39"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2308214"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.2873951"},{"article-title":"Chip aging becomes design problem","year":"2021","author":"bailey","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00109"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228572"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2672976"},{"journal-title":"Reconfigurable Computing The Theory and Practice of FPGA-Based Computation","year":"2008","author":"hauck","key":"ref45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2409051"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2914036"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00122-7"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1080\/10655140290011087"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2018.8349681"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.507012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP49362.2020.00018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967039"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2006.373273"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3194554.3194631"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2016.7479175"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2717764.2717783"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2217962"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1629395.1629434"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2937738"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2016.7483887"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2020.2978874"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2011.54"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3473909"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2999613"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/10349221\/10138734.pdf?arnumber=10138734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T19:43:04Z","timestamp":1702496584000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10138734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2023.3279419","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"type":"electronic","value":"2168-6750"},{"type":"electronic","value":"2376-4562"}],"subject":[],"published":{"date-parts":[[2023,10]]}}}